[Close] 

Manager, Security Operations

Description This role is responsible for establishing and maintaining the enterprise-wide IT security infrastructure to ensure the security, integrity, and availability of the company's information assets through the rigorous application of information security/information assurance policies, principles, and practices. Provide leadership for the information security operations of the company, including oversight of the incident response team, forensics, eDiscovery, threat and vulnerability management, etc. to contain the impact of potential security incidents, as well as leading timely recovery to normal operations to reduce impacts of incidents. Develop, Document and drive the information security event & incident response strategy for appropriate response and recovery from security events. Design and execute security event exercises across Information Security, IT and the enterprise. Work with security functions to assess and continually improve monitoring strategies for enhanced visibility and decreased time to detect and respond to an incident. Identify gaps within security monitoring and alerting and works with technical teams to obtain needed information. Provide event analysis and log correlation to management when security incidents occur. Troubleshoot complex hardware, software and network issues. During Information Security events, lead crisis operations to successful mitigation. Serve as primary point of contact to Managed Service Provider. Perform other duties as assigned. Minimum Requirements Bachelor's degree in information systems, or related field, OR At least eight years applicable experience Expert knowledge in the security principles and controls at all layers (SIEM, Firewalls, Routers, Proxy, Netflow, Intrusion Prevention Systems, Web Application Firewalls (WAF), Email Security, Endpoint, Applications, Operating systems, Databases) Expert level understanding of information security frameworks (e.g., NIST, PCI, etc.) Strong event analysis and log correlation skills Ability to identify gaps within security monitoring and alerting/working with technical teams to obtain information needed to obtain needed information Experience with security operation automation Prior experience with security incident identification, classification, response, preparation and management Effective problem solver and demonstrated ability to work effectively in both independent and team settings Excellent verbal and written communication skills, experience developing and delivering effective training materials Prior experience in IT Information Security Self-motivated and able to work independently Preferred: Previous experience leading individuals or a team CISSP GCIH Certified Incident Handler CEH -- Certified Ethical Hacker 2685
Salary Range: NA
Minimum Qualification
8 - 10 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.